A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Vulnerable Path Attack and its Detection
2017
KSII Transactions on Internet and Information Systems
In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. ...
A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. ...
Weighted Directed Graph Our illustrative study uses the website of Sun Yat-sen University. The web crawler Heritrix is used to fetch the pages of the website of Sun Yat-sen University. ...
doi:10.3837/tiis.2017.04.018
fatcat:hnurkcbbynfsdb5zojocfc7r7u
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine
2017
International journal of network security and its applications
Then, we build normal users' browsing models by using OC-SVM. Finally, we use these models to detect application-layer DDoS attacks. ...
This kind of attacks is more difficult to prevent than other kinds of DDoS attacks. ...
NUMERICAL RESULTS
Datasets To validate our defence method, we used the web-logs of the website of Sun Yat-sen University. The logs were collected on 10/4/2013. ...
doi:10.5121/ijnsa.2017.9102
fatcat:i5pygo5pdzgrdbknzjwboavfn4
A Blockchain-Assisted Trust Access Authentication System for Solid
2020
IEEE Access
The Solid (Social Linked Data) project focuses on data sharing and privacy security and aims to build a decentralized ecosystem that radically changes the way web applications work today. ...
Specifically, we explore to integrate threshold RSA signatures in a permissioned blockchain system to enable a fault-tolerant distributed signature scheme, thereby enhancing the resilience and robustness ...
This project aims to build a decentralized ecosystem for current social web applications, where the data are completely owned by users themselves who can allow external applications how to use it for certain ...
doi:10.1109/access.2020.2987608
fatcat:5uhfyi3qxbdczi57hejdsoyequ
WEB-BASED INFORMATION MANAGEMENT SYSTEM FOR THE LONG TERM ECOLOGICAL RESEARCH PROGRAM IN KENTING, TAIWAN
2008
Journal of Marine Science and Technology
This paper introduces a web-based information management system which has been set up as a collaborative facility to allow key environmental and ecological information access for the Long Term Ecological ...
Web DBMS is to provide the fundamental data transaction and query, while DW is to support advanced data query by aggregating available datasets. ...
In the current system, OWC is used to insert a pivot table and a pivot chart in the web page. ...
doi:10.51400/2709-6998.2001
fatcat:ik72p3deqvhxzpjxj5lprxf53i
CavityPlus: a web server for protein cavity detection with pharmacophore modelling, allosteric site identification and covalent ligand binding ability prediction
2018
Nucleic Acids Research
CavityPlus is a web server that offers protein cavity detection and various functional analyses. ...
CavPharmer uses a receptor-based pharmacophore modelling program, Pocket, to automatically extract pharmacophore features within cavities. ...
for their helpful discussion and test on the CavityPlus web server. ...
doi:10.1093/nar/gky380
pmid:29750256
pmcid:PMC6031032
fatcat:nq4jv4ne7veflaa3d46ulyc6mm
cano-wgMLST_BacCompare: A Bacterial Genome Analysis Platform for Epidemiological Investigation and Comparative Genomic Analysis
2019
Frontiers in Microbiology
We imposed this tool on a designated web server, cano-wgMLST_BacCompare, to enable users to create a wgMLST tree and canonical wgMLST tree automatically from their uploaded bacterial genomes for not only ...
Hence, we designed a web service tool based on wgMLST-constructed tree topology coupled with the feature selection method to create the "canonical wgMLST (cano-wgMLST) tree." ...
In this study, by using the feature selection approach, we developed a user-friendly web server named cano-wgMLST_BacCompare to assist users in building a genetic relatedness tree based on the extracted ...
doi:10.3389/fmicb.2019.01687
pmid:31396192
pmcid:PMC6668299
fatcat:54ayedydnrelznpngfggalfxni
Your mediators need data conversion!
1998
Proceedings of the 1998 ACM SIGMOD international conference on Management of data - SIGMOD '98
Due to the development of the World Wide Web, the integration of heterogeneous data sources has become a major concern of the database community. ...
We also present the architecture, implementation and practical use of the YAT prototype, currently under evaluation within the OPAL* project. ...
Acknowledgments The authors would like to thank Serge Abiteboul, Daniel Ghan and Anne-Marie Vercoustre for usefur comments on earlier versions of the paper. ...
doi:10.1145/276304.276321
dblp:conf/sigmod/CluetDSS98
fatcat:hy2v5l7tszgnlf2hmnjk5x346u
Miro Web: Integrating Multiple Data Sources through Semistructured Data Types
1999
Very Large Data Bases Conference
The MIROWeb Esprit project has developed a unique technology to integrate multiple data sources through an object-relational model with semistructured data types. ...
It addresses the problem of integrating irregular Web sources and regular relational databases through a mediated architecture based on a hybrid model, supporting relational, object and semistructured ...
Acknowledgments We would like to thank Dana Florescu, Peter Fankhauser, Henri Laude and Patrick Valduriez for their help within the design of the MIROWeb system. ...
dblp:conf/vldb/BouganimCDDGS99
fatcat:aotzsvrsqnfmvfs25y7gs4jkqa
ChinaGrid: Making Grid Computing a Reality
[chapter]
2004
Lecture Notes in Computer Science
Grid computing presents a new trend to distributed computing and Internet applications, which can construct a virtual single image of heterogeneous resources, provide uniform application interface and ...
The purpose of this paper is to introduce this great grid project to the world completely for the first time. ...
I also would like to take this opportunity to thank all the experts in ChinaGrid project for their devoting time to this project, and making grid computing a reality in China. ...
doi:10.1007/978-3-540-30544-6_2
fatcat:x7wfsimiifeqfoqjjly2ln7uiy
Mining Web Usage within a Local Area Network
2010
International Journal of Engineering and Technology
In this study, we propose a novel method of mining web usage within a local area network (LAN). The proposed method makes use of Taiwanese Yahoo! (i.e. Yahoo! ...
According to the category path, web usage statistics can be accumulated from the bottommost level, i.e. a single website, to the topmost level, i.e. the set of all websites. ...
The proxy server is used to store web pages that have been downloaded through it in advance. When a browser requests to download a web page, the proxy server checks if the web page is already stored. ...
doi:10.7763/ijet.2010.v2.161
fatcat:fri5mc6ebvgcjpjyzb6uniss54
A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
2009
IEEE/ACM Transactions on Networking
Entropy of the user's HTTP request sequence fitting to the model is used as a criterion to measure the user's normality. Finally, experiments are conducted to validate our model and algorithm. ...
An extended hidden semi-Markov model is proposed to describe the browsing behaviors of web surfers. ...
They also thank the Network Center of Sun Yat-Sen University for their help with the access logs. ...
doi:10.1109/tnet.2008.923716
fatcat:ubz5gih5rnh53iihsngftn26ua
A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment
2017
JMIR Public Health and Surveillance
Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload ...
Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. ...
They are grateful to all students, parents, teachers, and principals of the 107 schools who participated in this study. ...
doi:10.2196/publichealth.6810
pmid:28986338
pmcid:PMC5650675
fatcat:jjkcuxywqzagfevsuae3sudqb4
A prototype WWW literature recommendation system for digital libraries
2003
Online information review (Print)
The proposed literature recommendation system makes use of the Web usage logs of a literature digital library. ...
This article describes a service for providing literature recommendations, which is part of a networked digital library project whose principal goal is to develop technologies for supporting digital services ...
The main objective was to test our four hypotheses. NSYSU-ETD runs on PC Solaris 2.7 and uses Apache 1.3.9 as the Web server. ...
doi:10.1108/14684520310481436
fatcat:3mqtk7hd6jffllfhu4jz5ju53u
The Application and Practice of Parallel Cloud Computing in ISP
2011
2011 Sixth Open Cirrus Summit
In order to deal with massive data processing, C hina T elecom has deployed a platform named distributed service engine, which is based on parallel cloud computing technology. ...
T his paper describes the design of this platform and how it can be used in telecom industry. ...
Its philosophy is to use large amounts of commodity computers to build a highly parallel computation and storage platform. Currently, this technology is widely used by internet companies like Yahoo! ...
doi:10.1109/ocs.2011.7
fatcat:uwwlvrsyhrckdpefkkd3ga2gpy
On wrapping query languages and efficient XML integration
2000
SIGMOD record
Modern applications portals, e-commerce, digital libraries, etc. require integrated access to various information sources from traditional RDBMS to semistructured Web repositories, fast deployment and ...
Because of its exibility, there is an increasing interest in using XML as a middleware model for such applications. XML enables fast wrapping and declarative i n tegration. ...
In this example, we plan to build a Web site providing access to commercial information about cultural goods 1 . ...
doi:10.1145/335191.335395
fatcat:3t6hja7ucnddfjkad5crrch57u
« Previous
Showing results 1 — 15 out of 249 results